Call Us: 1-866-802-9405

Category

Information Security Best Practices
It can feel overwhelming to know where to start when it comes to protecting your staff from security threats. That’s why we created this infographic to explain three steps that you can take right now to keep your employees safe from exploitation. Following these steps will help to create a questioning culture where your employees...
Read More
Everyone Using These Tools Should Consider How Secure They Are With the rapid transition to work from home environments…it’s no wonder that the use of web meeting technologies has grown exponentially. Everyone using these tools should consider how secure they are as revelations about Zoom have highlighted potential risks.  With an easy to use interface and...
Read More
Protecting Important Data in a Work from Home (WFH) World In true American spirit, companies nationwide have quickly adapted to the rapid spread of COVID-19 and transitioned employees to a work from home (WFH) model. This approach is critical to limiting the impact of the virus, and for many organizations, it is a viable workaround....
Read More
Katie Arrington, DOD’s chief information security officer for the Office of the Undersecretary of Defense for Acquisition and Sustainment, recently announced the Cybersecurity Maturity Model Certification (CMMC) for NIST 800-171. In 2020, certification will be required to secure and renew government contracts.  CMMC certification requires an audit by an approved 3rd party to validate cybersecurity...
Read More
Prepare your Staff Let’s face it…there are no easy breaks in business.  And the malicious players are happy to exploit your employees at every turn.  The onslaught of emails and phone calls specifically designed to deceitfully extract money from your firm will not stop.  The most important thing you can do is prepare your staff.  ...
Read More
You don’t have to be a large company to be a (cyber) target; you can be a small to medium-sized company. “On average, it takes 244 days before a company realizes they were breeched,” says Rob Cote, President of Security Vitals. We often hear from executives who state that they have never been breached…to which...
Read More
In a lead-up to 2019’s Michigan Celebrates Small Business Gala Celebration, Jeffrey Mosher of the Michigan Business Network spoke with Security Vitals’ President Rob Cote as a 2019 Smartzone Best Small Business awardee. Listen to the Interview http://www.michiganbusinessnetwork.com/blog/smartzone-best-small-business-security-vitals  
Read More
A health care provider has closed unexpectedly due to a ransomware attack. ENT & Hearing Services in Battle Creek, Michigan, is the first health provider in the nation to close due to cybersecurity flaws. Since HIPAA is based on NIST 800-53, father to NIST 800-171, ENT & Hearing Services demonstrates the importance of maintaining diligence...
Read More
Welcome to part three of our 3-part series about security and compliance. For those of you who missed part one or two, feel free to follow these links to get up to speed on this series: Part 1: Related but Not the Same, and Part 2: Compliance Means We’re Secure, Right? In the previous two...
Read More
Welcome to part 2 in our 3 part series about security and compliance. For those of you who missed part one, feel free to give it a quick read here. When the need for compliance hits your organization, many things can be involved, such as hiring outside consultant help, purchasing new hardware and software, even...
Read More
1 2 3